Kali Linux Essentials For Ethical Hackers Beginners Guide

Learn Essentials of Kali Linux Hackers OS To Get Started Your Carrier in Cybersecurity, Ethical Hacking and Pentesting!

Last updated 2022-01-10 | 4.1

- Kali Linux operating system Essentials.
- A solid foundation of the Kali Linux operating system.
- Perform the basic operations required for any Linux admin.

What you'll learn

Kali Linux operating system Essentials.
A solid foundation of the Kali Linux operating system.
Perform the basic operations required for any Linux admin.
Understand how native Linux commands can be used by hackers

* Requirements

* Basic knowledge of computer terminology
* An Internet connection
* Any Linux Based Operating System
* Knowledge of any Command Line is Helpful
* but Not Necessary.

Description

Welcome to our course Kali Linux Essentials For Ethical Hackers - Full Course! I’m Mehedi Shakeel and I’m a freelance ethical hacker. This course teaches the basics & essentials things of using Kali Linux. In the next 1 hour, you will get familiar with Kali Linux shell & terminology by understanding how to navigate the directory structure, how to list the content of the directory and understand how file permissions work along with how to change file permissions.

I designed this course in such a manner that you can easily learn from this course even if you don’t have any previous knowledge about Kali Linux or hacking. I recommend this course to everyone who wants to become an ethical hacker. This course is designed for those people willing to learn Kali Linux system fundamentals and this will be the first step towards learning Ethical hacking & Penetration testing with Kali Linux. Linux commands play a major role in performing major tasks on the command line itself so you must know the basics of the kali Linux terminal or shell commands and kali Linux terminology.

if you are a beginner you want to start from zero or if you are a professional and want to improve your kali Linux skills so this course will increase your knowledge about Kali Linux. I can assure you from this course you will learn something new that no one will teach you in any other course.

Topics include:

  • Introduction to Course

  • Download, Setup & Run Kali Linux

  • Useful keyboard Shortcuts

  • Familiar with Linux terminal

  • Files & directories manipulation and management

  • Listing a directory’s contents

  • Understanding file permissions and ownerships

  • Changing permissions

  • Users & System Information Enumeration and more.

  • Online Anonymity

I can assure after completing this video course you will learn everything you required to get into infosec and ethical hacking, So, what are you waiting for? Take this course and start learning now Kali Linux Essentials For Ethical Hackers. I’m waiting for you in the course lectures.

Notes:

This course is created for educational purposes only.

This course is totally a product of Md Mehedi Hasan and no other organization is associated with it or a certification exam.

Although, you will receive a course completion certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.

Who this course is for:

  • Getting Started in Ethical Hacking
  • Learning Cyber Security
  • Basic About Linux Operating Systems
  • Basic Networking
  • Ethical Hacking
  • Information Technology
  • Penetration testing
  • Any Fresher Who Wants to Learn Basic Linux Shell Commands
  • Expert who Needs to Brush up Basic Linux Shell Skills

Course content

4 sections • 18 lectures

Introduction Preview 01:17

What’s going on guys. It’s Mehedi Shakeel. From Today I’m going to start a new series of kali Linux basics call Kali Linux Essentials For Hackers. In this video series, I’m going to cover from the basics of Kali Linux what you should know about and if you want to start your carrier in infosec or cybersecurity.

If you already know the basics of Linux and especially about kali Linux then also, I will suggest you follow this video series because if you had any loophole in your basics then after completing this video series you can fill-up those loopholes. I’m going to cover almost everything about kali Linux and those stuff which going help you to make your basic stronger in this ethical hacking field.

In this video series, you will learn about all the basic commands and useful keyboard shortcuts which going to speed up your task in Kali Linux. Also, I will cover file manipulation, user information enumeration, networking, Permissions, piping, process management, proxy chains, ssh, and more about basic kali Linux tools usage.

I hope you all will enjoy and learn a lot from this video series. Also, guys if you want to suggest any particular topic then let me know in the feedback section so that I can include those topics in the next video series.

So, Guys, that’s all for this introduction part. In my next video of this series, I will start teaching you everything you need to know to become a cybersecurity expert and ethical hacker.


How To Download & Run Kali Linux on Vmware Preview 04:54

Welcome back to 2nd video of Kali Linux essentials for hacker series. Today in this video I will be showing you how to get yourself into the kali Linux machine Without any kinds of installation.

Kali Linux team and offensive security team provides pre-installed kali Linux VMware machine which is fully configured to use. You just need to download that file from the Kali Linux website and you are ready to go. You Just need to make sure you have installed VMware workstation on your pc.

Learn Useful Keyboard Shortcuts & Use Kali Linux Like a Pro Preview 05:03

Welcome back to 3rd video of Kali Linux essentials for hacker series. Today In this video I will teach you some of the very useful kali Linux keyboard shortcuts that Going to make you using kali Linux very efficient.

Keyboard Shortcuts :

  • CTRL + ALT + T to open the terminal window

  • CTRL + Shift + T to open a new tab on a single terminal

  • CTRL + Shift + W to close the tabs and the terminal window

  • CTRL + l to clear your full terminal  window

  • CTRL + Shift & ‘+’ sign to Increase the font size of the terminal window

  • CTRL + Shift & ‘-‘ sign to decrease the font size of the terminal window

  • CTRL + C to stop any running process on the terminal window and more

Manage and Manipulate Files & Directory Preview 06:42

Welcome back to the 4th video of Kali Linux essentials for hacker series. Today in this video I will teach you some of some basic commands which are used for file management and manipulation.

Understanding Permissions & Ownerships System Preview 05:33

Welcome back to the 5th video of Kali Linux essentials for hacker series. Today in this video you are going to learn two types of authorization levels Ownership and permissions.

Basic Grep & Piping Preview 05:02

Welcome back to the number 6 video of Kali Linux essentials for hacker series. Today in this video you are going to learn using grep, pipe, and sort commands. Those three commands are the most useful command in Kali Linux.


Piping: The Pipe is a command in Linux that lets you use two or more commands, such that the output of one command serves as input to the next. In short, the output of each process directly as input to the next one like a pipeline. The symbol '|' denotes a pipe. Pipes help you mash-up two or more commands at the same time and run them consecutively.

Grep: grep command is very useful to search for a text portion or get some specific information. using the grep command, we can scan a text file and get customize search results.

Sort: This command helps in sorting out the contents of a file alphabetically.

Process Controlling & Management Preview 03:08

Welcome back to the 7th video of Kali Linux essentials for hacker series. Today in this video you are going to learn about process management. In this video, we will talk about what is the process? Types of process and some process management command like FG, top, ps & kill.


What is the process?

An instance of a program is called a Process. In simple terms, any command that you give to your Linux machine starts a new process. you can have multiple processes for the same program.


Type of processes :

Basically, there are two Types of Processes:

  1. Foreground processes: Foreground Processes run on the screen and need input from the user.

    For example, you can take Office Programs


  2. Background processes: Background Processes run in the background and usually do not need user input.

    For example, you can take an Antivirus.

Communicating With Other System With Terminal Preview 04:17

Welcome back to the 8th video of Kali Linux essentials for hacker series. Today in this video you are going to learn about the communication commands of Kali Linux. While working on a Linux operating system, you may need to communicate with other devices. For this, there are some basic utilities that you can make use of. These utilities can help you communicate with networks, other Linux systems, and remote users those utilities are ssh, ping, FTP, and telnet..in this video, we are going to learn about them.

All About Networking & Internet Connectivity Setup Preview 06:09

Welcome back to the 9th video of the Kali Linux essentials series. Today in this video you are going to learn about all the network-related commands and usage of them like ifconfig to set up network and internet connectivity, display status, and more.

Find Users ,System and Kernel informations Preview 05:03

Welcome back to the number 10 video of Kali Linux essentials for hackers series. Today in this video you are going to learn about how to enumerate basic information about your system, users, and kernel information. After watching this video you will know how you can find any user and Linux operating system information like the name of your Linux distro, kernel version, release date. Code name and more.

Setup TOR & Proxychains To Became Anonymous Online Preview 05:01

Welcome back to the 11th video of Kali Linux essentials for hackers series. Today in this video you are going to learn about tor and proxy chains. In his video, I will talk about tor and proxy chains, and also I will show you how to setup Tor and proxy chains on a kali Linux machine to become anonymous online.

Way To Learn Every Kali Tool Basics On Your Own! Preview 03:26

With this video, I am ending this kali Linux essentials for hackers series. Give your feedback and rate this course if you want to learn advanced videos of Kali Linux ethical hacking and penetration testing and I will giveaway free coupons for my upcoming courses to some of you. Thank you all!

Boot Kali Linux With Live USB Preview 03:17

Boot Kali Linux With Persistence USB Preview 04:11

Boot Kali Linux With Android Phone Preview 07:00

Accessing Kali Linux With Browser Preview 04:18

Accessing Kali Linux With Android Phone Preview 03:16

Accessing Kali Linux With Windows 11 Preview 02:40